Softprom — IT Distributor
  • FUNCTIONS
  • HOW IT WORKS
  • CONSULTATION
  • ABOUT COMPANY
  • CONTACTS
  • EN | English
SoftpromLogoWhiteSmall
  • FUNCTIONS
  • HOW IT WORKS
  • CONSULTATION
  • ABOUT COMPANY
  • CONTACTS
  • EN | English

OUR DIRECTIONS

Cyber Security

IT Systems

Cloud

Video Security

Softprom — Value Added IT Distributor

EXPLORE MORE

Follow us on Facebook Follow us on LinkedIn Follow us on YouTube

    CONTACT

    Softprom Distribution GmbH

    Graben 19, 1010 Vienna, Аustria

    -

    info@softprom.com

    softprom.com

    Softprom provides professional testing, training, installation, implementation, and technical support services.

    ✕
    ✕
    SoftpromLogoWhiteSmall
    • FUNCTIONS
    • HOW IT WORKS
    • CONSULTATION
    • ABOUT COMPANY
    • CONTACTS
    • EN | English
    • English
    • Deutsch
    • Polski

    EXPLORE MORE

    Follow us on Facebook Follow us on LinkedIn Follow us on YouTube
    Softprom — IT Distributor
    • FUNCTIONS
    • HOW IT WORKS
    • CONSULTATION
    • ABOUT COMPANY
    • CONTACTS
    • EN | English

    PERIMETER 81 — SECURE REMOTE NETWORKS, BASED ON THE ZERO TRUST ARCHITECTURE

    HOW IT WORKS

    FUNCTIONS

    Perimeter81Point-1

    Zero Trust Network Access

    Reduce your network’s attack surface with Zero Trust Network Access
    ZTNA

    Segmented and isolated network access

    If employees are connected, they and your network are protected — with identity-based access rules, 2FA, traffic encryption, monitoring, and more.

    Request

    Privatize traffic across all layers, ports and protocols

    Picking only one encryption solution can cause issues when resources are located in various cloud environments and users connect with their preferred device and location. With Perimeter 81 you can deploy multiple protocols at once, depending on the relevant environment and connection.

    Customized access policy for users and their devices

    When all employees have the same access permissions and those permissions grant full network access, the attack surface is wide and vulnerabilities abound. Segment your network and narrow access rules to individual users and groups, with authentication enforced via identity providers.

    Integrate security into every environment

    When their companies rely heavily on the cloud, and encourage remote work and BYOD, a primary concern for IT is complexity and reduced visibility into network activity and access. Perimeter 81 integrates with all your various solutions and services for total network awareness.

    Boost resource availability for remote workers

    Now that the traditional network perimeter is gone and access occurs further away from network resources, it’s time to bring resources closer to where they’re needed. Private network gateways limit latency and boost speeds for productive and agile remote work no matter where your employees are located.

    Perimeter81Point-1

    Business VPN

    Choose a VPN alternative and expand beyond your legacy VPN
    VPN

    Security, privacy, and access in the cloud

    Gain complete traffic encryption and more agile access policies, without the hardware or complexity involved in traditional solutions.

    Request

    Encryption for every port and protocol

    When critical resources are present across many cloud environments, one VPN protocol for your users will fail to cover all security gaps. Perimeter 81 allows you to deploy multiple protocols like IPSec and WireGuard at the same time for different resources and users.

    Unique, secure access policies by use

    The simplest thing you can do to protect your network is to segment critical resources and ensure that each user only has access to the resources relevant to them. Perimeter 81 relies on identity providers to login and automatically provide optimized access rules for users and groups.

    Ensure security solutions cover all network resources

    A primary concern for IT when their companies expand into the cloud, remote work, and BYOD is network complexity, which can obstruct the visibility of access and activity and risk security significantly. Perimeter 81 integrates with any solution or service for total network omniscience.

    Maximize resource availability for remote employees

    Cloud adoption is great for IT agility but it also means that sensitive resource access is happening further away than ever before. Security solutions must be closer to the action, and therefore Perimeter 81 enables easy deployment of VPN gateways, public or private, around the world.

    Other Perimeter 81 services

    Firewall-as-a-service-hero

    Firewall as a Service

    Control network access with Firewall as a Service. Easily create simple rules to protect your essential resources.

    REQUEST DEMO

    Platform-sase-hero-image-1024x599

    Secure Access Service Edge (SASE)

    Secure Access Service Edge (SASE) is a blueprint for better business security and involves the combination of software-defined edge networking, user-focused authentication, and access control, and seamless integration across the cloud.

    REQUEST DEMO

    Web-Filtering_HERO-1024x633

    Secure Web Gateway

    Create user or group-specific rules that determine which sites are blocked, warned against or allowed. With total admin control over Internet access, employees can safely browse the web while avoiding online threats.

    REQUEST DEMO

    SDP-Core_HERO-1

    Software-Defined Perimeter (SDP)

    Design a flexible, stronger access policy playbook around user and device authentication with a Software-Defined Perimeter. Whether your critical corporate resources are in the cloud or local servers, SDP enables IT to easily build a wall around the entire network. 

    REQUEST DEMO

    PACKAGES

    ESSENTIALS

    $8 per user/mo
    Core

    Cloud network management platform

    Global private network

    Agentless application access | 2 Applications

    Zero Trust policy-based segmentation

    Fast and easy network deployment

    Unlimited data usage

    Activity audits & reports | 14 days

    Gateway performance | 500 Mbps/Gateway

    Unlimited network tunnels

    Network

    Site-to-Site interconnectivity

    Split tunneling

    Private DNS

    Security

    Secure Web Gateway New | Add-On

    Two-factor authentication

    Agents

    Easy-to-use apps

    Wireguard protocol

    Automatic Wi-Fi Security

    Request trial

    PREMIUM

    $12 per user/mo
    Core

    Cloud network management platform

    Global private network

    Agentless application access | 10 Applications

    Zero Trust policy-based segmentation

    Fast and easy network deployment

    Firewall as a Service | 10 Policies

    Unlimited data usage

    Activity audits & reports | 30 days

    Gateway performance | 1000 Mbps/Gateway

    Unlimited network tunnels

    Premium public network

    Network

    Always-on VPN

    Site-to-Site interconnectivity

    Split tunneling

    Private DNS

    DNS Filtering

    Security

    Secure Web Gateway New | Add-On

    Two-factor authentication

    Device Posture Check | 3 Profiles

    Single Sign-On capabilities

    Agents

    Easy-to-use apps

    Wireguard protocol

    Automatic Wi-Fi Security

    User Configuration Profiles | 3 Profiles

    Disable Sign-Out

    Request trial
    most popular

    PREMIUM PLUS

    $16 per user/mo
    Core

    Cloud network management platform

    Global private network

    Agentless application access | 100 Applications

    Zero Trust policy-based segmentation

    Fast and easy network deployment

    Firewall as a Service | 100 Policies

    Unlimited data usage

    Activity audits & reports | 30 days

    Gateway performance | 1000 Mbps/Gateway

    Unlimited network tunnels

    Premium public network

    Network

    Always-on VPN

    Site-to-Site interconnectivity

    Split tunneling

    Private DNS

    DNS Filtering

    Security

    Secure Web Gateway New | Add-On

    Two-factor authentication

    Device Posture Check | 20 Profiles

    Single Sign-On capabilities

    Agents

    Easy-to-use apps

    Wireguard protocol

    Automatic Wi-Fi Security

    User Configuration Profiles | 10 Profiles

    Disable Sign-Out

    Advanced

    SIEM Integration | Add-On

    Dedicated Solution Architect

    API Support

    Request trial

    REQUEST DEMO

    about company

    Softprom — IT Distributor

    Softprom is a leading IT Distributor in Eastern & Central Europe, and the CIS with a portfolio of more than one hundred vendors.

    The company was founded in 1999 and nowadays it is represented territory in more than 30 countries.

    Our directions: Cyber Security, Cloud, IT Infrastructure, Video Security, CAD & Graphics.

    Request demo

    Request demo

    Request a consultation or demonstration, and try Perimeter 81 products now.

    Google
    December 2 2024 Oksana Luchko

    For the team, Google Workspace apps are like a chef's tried-and-true tools

    Read More
    crm
    July 30 2024 Lukas Salesedor

    How to Launch Ads on LinkedIn and Facebook with HubSpot

    Read More
    Bugcrowd
    February 2 2024 Softprom — IT Distributor

    Softprom News Jan 2024 - Top 10 Cyberattacks 2023

    Read More
    Softprom — IT Distributor

    Imprint: Softprom Distribution GmbH . Graben 19 . 1010 Vienna . Austria | All rights reserved